{"title":"Not-So-Low Hanging Fruit: Security and Privacy Research Opportunities for IETF Protocols","authors":"Christopher A. Wood","doi":"10.1145/3606464.3606481","DOIUrl":"https://doi.org/10.1145/3606464.3606481","url":null,"abstract":"The IETF is actively developing technical specifications for state-of-the-art cryptographic protocols that aim to improve user privacy in the areas of privacy-preserving measurement, anti-fraud systems, and related applications. The success of these protocols requires review and analysis from experts familiar with the underlying cryptographic concepts or problem areas. This paper presents research opportunities for work in this area that would help advance standardization and deployment of these technologies.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124520261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roman Beltiukov, Sanjay Chandrasekaran, Arpit Gupta, W. Willinger
{"title":"PINOT: Programmable Infrastructure for Networking","authors":"Roman Beltiukov, Sanjay Chandrasekaran, Arpit Gupta, W. Willinger","doi":"10.1145/3606464.3606485","DOIUrl":"https://doi.org/10.1145/3606464.3606485","url":null,"abstract":"As modern network communication moves closer to being fully encrypted and hence less exposed to passive monitoring, traditional network measurements that rely on unencrypted fields in captured traffic provide less and less visibility into today’s network traffic. At the same time, approaches that use techniques from machine learning (ML) to extract subtle temporal and spatial patterns from encrypted packet-level traces have shown great promise in offsetting the lack of visibility due to encryption [1–3, 5–7, 10–15, 18, 23, 24]. Despite their promise, ML-based approaches often have a credibility problem that arises from the quality of underlying training data. Given the challenges of curating high-quality training data at scale, researchers typically end up collecting their own (or reusing existing third-party or synthetic) data, often from small-scale testbeds. Such data is generally of low quality as it is not representative of the target environment, collected over too short of a time period, or measured at too coarse of a granularity. The learning models trained using such data tend to be vulnerable to different failure modes that make them not credible [8]. This observation begs a fundamental question, how can we develop credible ML artifacts for managing encrypted network traffic? This paper describes our ongoing efforts to enable researchers and practitioners to develop more credible ML artifacts by lowering the effort that is required for collecting more high-quality data for a wide range of learning problems from realistic and representative network environments.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127727850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cristian Munteanu, Oliver Gasser, Ingmar Poese, Georgios Smaragdakis, A. Feldmann
{"title":"Enabling Multi-hop ISP-Hypergiant Collaboration","authors":"Cristian Munteanu, Oliver Gasser, Ingmar Poese, Georgios Smaragdakis, A. Feldmann","doi":"10.1145/3606464.3606487","DOIUrl":"https://doi.org/10.1145/3606464.3606487","url":null,"abstract":"Today, there is an increasing number of peering agreements between Hypergiants and networks that benefit millions of end-user. However, the majority of Autonomous Systems do not currently enjoy the benefit of interconnecting directly with Hypergiants to optimally select the path for delivering Hypergiant traffic to their users. In this paper, we develop and evaluate an architecture that can help this long tail of networks. With our proposed architecture, a network establishes an out-of-band communication channel with Hypergiants that can be two or more AS hops away and, optionally, with the transit provider. This channel enables the exchange of network information to better assign requests of end-users to appropriate Hypergiant servers. Our analysis using operational data shows that our architecture can optimize, on average, 15% of Hypergiants' traffic and 11% of the overall traffic of networks that do not interconnect with Hypergiants. The gains are even higher during peak hours when available capacity can be scarce, up to 46% for some Hypergiants.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115506773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alex Huang Feng, Pierre François, S. Frénot, T. Graf, Wan-Ling Du, P. Lucente
{"title":"Daisy: Practical Anomaly Detection in large BGP/MPLS and BGP/SRv6 VPN Networks","authors":"Alex Huang Feng, Pierre François, S. Frénot, T. Graf, Wan-Ling Du, P. Lucente","doi":"10.1145/3606464.3606470","DOIUrl":"https://doi.org/10.1145/3606464.3606470","url":null,"abstract":"We present an architecture aimed at performing Anomaly Detection for BGP/MPLS VPN services, at scale. We describe the challenges associated with real time anomaly detection in modern, large BGP/MPLS VPN and BGP/IPv6 Segment Routing VPN deployments. We describe an architecture required to collect the necessary routing information at scale. We discuss the various dimensions which can be used to detect anomalies, and the caveats of the real world impacting the level of difficulty of such anomaly detection and network modeling. We argue that a rule-based anomaly detection approach, defined for each customer type, is best suited given the current state of the art. Finally, we review the current IETF contributions which are required to benefit from a fully open, standard, architecture.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116297363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Call for Collaboration: DNS Integrations","authors":"Swapneel Sheth, Andrew J. Kaizer","doi":"10.1145/3606464.3606471","DOIUrl":"https://doi.org/10.1145/3606464.3606471","url":null,"abstract":"This paper summarizes Domain Name System (DNS) integrations from the IETF, IRTF, ICANN, W3C, CAB Forum, blockchain namespaces, and decentralized application communities to raise awareness of the many parallel DNS integration efforts with a goal to bring these communities together -- perhaps at a future BoF -- to consider the development of best practices for responsible DNS integrations. Doing so would enable current and future applications to have clear paths to integrate responsibly with the DNS namespace while helping them to avoid unintended consequences that may lead to complications for both the DNS and integrating applications.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crisis, Ethics, Reliability & a measurement.network: Reflections on Active Network Measurements in Academia","authors":"T. Fiebig","doi":"10.1145/3606464.3606483","DOIUrl":"https://doi.org/10.1145/3606464.3606483","url":null,"abstract":"Network measurements are a necessary component of assessing real-world protocol use to inform the development of new and improvement of old protocols and standards. However, especially active measurements, i.e., measurements in which probes are sent to remote devices to illicit a response, face ethical challenges, are difficult to execute reliably, and may cause unintended harm. In this paper, we reflect on the connection between the Internet's growing complexity, the practicalities of academic research, and the likelyhood of reliability issues and unintended harm occurring in active measurements. We argue that communal infrastructure providing measurement services to the academic community could be a path forward to improve reliability and accessibility, while reducing the potential for unintended harm, and enabling PhD students to more easily draw from the experience of industry professionals.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128546315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lowering the Barriers to Working with Public RIR-Level Data","authors":"Alfred Arouna, Ioana Livadariu, M. Jonker","doi":"10.1145/3606464.3606473","DOIUrl":"https://doi.org/10.1145/3606464.3606473","url":null,"abstract":"Regional Internet Registries (RIRs) publish WHOIS, route object delegation, and reverse DNS zone files. These data are valuable resources for network researchers and engineers, yet contain inconsistencies and are not all available long-term. In this work, we consolidate and make available longitudinal RIR-level data, aiming to lower the barriers to start working with these data.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bremler-Barr, David Hay, Bar Meyuhas, Shoham Danino
{"title":"It's Not Where You Are, It's Where You Are Registered: IoT Location Impact on MUD","authors":"A. Bremler-Barr, David Hay, Bar Meyuhas, Shoham Danino","doi":"10.1145/3606464.3606472","DOIUrl":"https://doi.org/10.1145/3606464.3606472","url":null,"abstract":"We explore the impact of device location on the communication endpoints of IoT devices within the context of Manufacturer Usage Description (MUD), an IETF security framework for IoT devices. Two types of device location are considered: IP-based location, which corresponds to the physical location of the device based on its IP address; and user-defined location, which is chosen during device registration. Our findings show that IP-based location barely affects the domain set with which IoT devices interact. Conversely, user-defined location drastically changes this set, mainly through region-specific domains that embody location identifiers selected by the user at registration. We examine these findings' effects on creating MUD file tools and IoT device identification. As MUD files rely on domain allowlists, we show that security appliances supporting MUD need to manage a significantly larger number of MUD rules than initially anticipated. To address this challenge, we leverage EDNS Client Subnet (ECS) extension to differentiate user-defined locations without needing regional domains, consequently reducing the number of Access Control Entries (ACEs) required by security appliances.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122110703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mapping the Ukrainian Refugee Crisis Using Internet Measurements","authors":"Tal Mizrahi, Jose Yallouz","doi":"10.1145/3606464.3606469","DOIUrl":"https://doi.org/10.1145/3606464.3606469","url":null,"abstract":"The conflict in Ukraine, which started in February 2022, triggered a large-scale refugee crisis, with millions of Ukrainian refugees crossing the border to neighboring countries and millions of others forced to move within the country. In this paper we present an insight into how Internet measurements can be used to analyze a refugee crisis. We introduce a novel approach for estimating the number of refugees in each country using website analytics and show that our approach estimates the number of refugees with a Mean Percentage Error (MPE) of 11.8% compared to estimates published by the UN. We believe that these insights can greatly contribute to the ongoing international effort to map the flow of refugees in order to aid and protect them.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133314373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simon Bauer, Patrick Sattler, Johannes Zirngibl, Christoph Schwarzenberg, G. Carle
{"title":"Evaluating the Benefits: Quantifying the Effects of TCP Options, QUIC, and CDNs on Throughput","authors":"Simon Bauer, Patrick Sattler, Johannes Zirngibl, Christoph Schwarzenberg, G. Carle","doi":"10.1145/3606464.3606474","DOIUrl":"https://doi.org/10.1145/3606464.3606474","url":null,"abstract":"To keep up with increasing demands on quality of experience, assessing and understanding the performance of network connections is crucial for web service providers. While different measures, like TCP options, alternative transport layer protocols like QUIC, or the hosting of services in CDNs, are expected to improve connection performance, no studies are quantifying such impacts on connections on the Internet. This paper introduces an active Internet measurement approach to assess the impacts of mentioned measures on connection performance. We conduct downloads from public web servers considering different vantage points, extract performance indicators like throughput, RTT, and retransmission rate, and survey speed-ups due to TCP option usage. Further, we compare the performance of QUIC-based downloads to TCP-based downloads considering different option configurations. Next to significant throughput improvements due to TCP option usage, in particular TCP window scaling, and QUIC, our study shows significantly increased performance for connections to domains hosted by different giant CDNs.","PeriodicalId":147697,"journal":{"name":"Proceedings of the Applied Networking Research Workshop","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132558635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}